Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network
暂无分享,去创建一个
Ahmed Farouk | Mohamed Elhoseny | Aboul Ella Hassanien | Abdulaziz Shehab | Josep Batle | J. Batle | A. Hassanien | M. Elhoseny | A. Farouk | A. Shehab
[1] K. Somasundaram,et al. A comparative study of clusterhead selection algorithms in wireless sensor networks , 2011, ArXiv.
[2] Sanjay Kumar Madria,et al. A secure hierarchical model for sensor network , 2004, SGMD.
[3] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[4] Yang Li-zhen,et al. SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks , 2008, Wuhan University Journal of Natural Sciences.
[5] Mohamed Elhoseny,et al. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..
[6] S. Swamynathan,et al. Genetic-based Biometric Security System for Wireless Sensor-based Health Care Systems , 2012, 2012 International Conference on Recent Advances in Computing and Software Systems.
[7] Ramachandran Amutha,et al. Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms , 2013, Journal of Communications and Networks.
[8] Meng Zhang,et al. Energy-efficient and Secure Sensor Data Transmission Using Encompression , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.
[9] Dirk Westhoff,et al. Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .
[10] Mohamed Elhoseny,et al. Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm , 2015, IEEE Communications Letters.
[11] Gang Hu,et al. Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.
[12] Maamoun Ahmed,et al. Data Mining and Fusion Techniques for WSNs as a Source of the Big Data , 2015 .
[13] Mukesh A. Zaveri,et al. Synthesized Cluster Head Selection and Routing for Two Tier Wireless Sensor Network , 2013, J. Comput. Networks Commun..
[14] Jaecheol Ryou,et al. ID-based sensor node authentication for multi-layer sensor networks , 2014, Journal of Communications and Networks.
[15] Wei Zhang,et al. A survey on intelligent routing protocols in wireless sensor networks , 2014, J. Netw. Comput. Appl..
[16] Li Xu,et al. An Efficient Secure On-Demand Routing in Clustered Wireless Ad Hoc Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[17] Vallipuram Muthukkumarasamy,et al. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[18] Aboul Ella Hassanien,et al. An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks , 2014, Bio-inspiring Cyber Security and Cloud Services.
[19] Ricardo Dahab,et al. SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..
[20] Qiang Zhou,et al. A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks , 2014, Sensors.
[21] Ankit Thakkar,et al. Cluster Head Election for Energy and Delay Constraint Applications of Wireless Sensor Network , 2014, IEEE Sensors Journal.
[22] Mohsen Guizani,et al. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[23] Xiaohui Yuan,et al. Extending self-organizing network availability using genetic algorithm , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[24] Ebin Deni Raj. An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks -Edrleach , 2012 .
[25] Xiaohui Yuan,et al. An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.
[26] Abbas Karimi,et al. Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network , 2013 .
[27] Bechir Hamdaoui,et al. Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.
[28] Souheila Bouam,et al. Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..